Scenario: LMJ-Ad corporate management has been informed by the network administrative team that there was a malware attack and infection overnight at the system level

by | Sep 6, 2021 | Uncategorized | 0 comments

Your individual project for this unit has you responding to management as the IT Team Lead concerning the malware scenario below.
Scenario: LMJ-Ad corporate management has been informed by the network administrative team that there was a malware attack and infection overnight at the system level, now spreading to the network enterprise level, requiring the incident response team to take immediate action. The infection came from a malware attachment on a phishing email and was reported by a user with a priority trouble ticket. Initial interviews suggest the incident may have come from an internal employee.
Provide the following for your investigative report:
General Incident Information
Cover Page (Page 1 – not counted in total page count):
Date: Incident POC Name
Time: Incident POC Phone
Time Zone: Incident POC Email
Initial Identification
Section 1.0 (Page 1): Date, time, and time zone for first detection
Example: Threat identified 8/6/20; 11:34am; ET
Section 2.0 Impacted Personnel (Page 1): List names and contact information for all persons involved in detection and initial investigation
Example: Mr. John Doe; Incident Response Lead; 555-555-5656; Mrs. Jane Doe; Network Engineer; 556-557-5678
Section 3.0 Incident Detection Specifics (Page 1; 2 paragraphs): How was the incident detected?
Example: IDS/IPS/HIDS/NIDS alerts; Violation of user behavior baseline; security event threat detection; suspicious network traffic patterns; ransomware, or malware alerts from anti-virus/malware software
Section 4.0 Threat Identification (Page 2; 2 paragraphs): What do you think the threat is?
Example: Classification of threat is based on type of behavior analyzed either live or via logs, and recovered digital forensics data
Section 5.0 Infected Resources (Page 3-4; 2-3 paragraphs): List of systems and network components involved both at the system and network levels: System 1, 2, 3; Network component A, etc., and infections found
Example: Lenovo 20L5000; Serial #; IP Address x; infection
Section 6.0 Digital Evidence (Page 4-5; 2-3 paragraphs): Where can supporting evidence be found?
Example: Location of log file, log file types, time stamps, screen shots, IDS reports
Section 7.0 Tools and Procedures (Page 5-6; 2-3 paragraphs): Describe the tools and procedures used for acquiring the media (ex., disk-to-disk, disk to image, sparse copy), thus creating the forensic image of the media for examination.

Our Guarantees

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university, or professional, and we will assign a writer who has a respective degree.

 

Professional certified writers

We have hired a team of professionals who provide expert academic help. Most of them are native speakers and PhD holders who are able to take care of any assignment you need help with.

 

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support team.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all sources and in-text citations. We also promise full confidentiality in all our services.

24/7 Customer Support

Our support agents are available 24/7 and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

 

About us

We are a team of like-minded people who established Wileyscholars.com to help students all over the world. It all began a few years ago when we, as students, helped each other complete our own assignments. Shortly after, we discovered that other students need help too: that is when Wileyscholars was created. It is an online service that provides help with academic assignments all over the world. Our main aim is to help hundreds of students pass their tests and home assignments by giving advice and helping to get to know the subject better.

 

 

Let’s Start a Conversation